CN113473457B - Non-orthogonal security coding method based on privacy protection - Google Patents
Non-orthogonal security coding method based on privacy protection Download PDFInfo
- Publication number
- CN113473457B CN113473457B CN202110711353.2A CN202110711353A CN113473457B CN 113473457 B CN113473457 B CN 113473457B CN 202110711353 A CN202110711353 A CN 202110711353A CN 113473457 B CN113473457 B CN 113473457B
- Authority
- CN
- China
- Prior art keywords
- bit
- information
- encryption
- processing
- redundancy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0002—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
- H04L1/0003—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0006—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/0224—Channel estimation using sounding signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a non-orthogonal security coding method based on privacy protection, which comprises the following steps: channel estimation and key distribution steps: embedding a decryption key of a target user to be encrypted into a pilot sequence, and transmitting pilot frequency and a key block to the target user to be encrypted; a first modulation step: performing first encryption processing on a plurality of groups of information bits to obtain first encrypted data, wherein the first encryption processing comprises redundancy-free bit modulation and redundancy bit modulation; a second modulation step: performing high-dimensional modulation on the first encrypted data to obtain second encrypted data; demodulation and decryption steps: and processing the second encrypted data according to the multi-user joint detection, judging whether the second encrypted data is the personal information of the current terminal, and if so, performing decryption processing, wherein the decryption processing is inverse processing combining the first encryption processing, the high sparse codeword mapping and the second encryption processing. The method realizes non-orthogonal transmission with high spectrum efficiency and privacy protection.
Description
Technical Field
The invention relates to the fields of security coding, wireless communication and signal processing, in particular to a non-orthogonal security coding method based on privacy protection.
Background
The rapid development of the internet of things has led to an increasing scale of user communications, which presents many difficulties and challenges to limited spectrum resources. In an orthogonal multiple access system, a section of spectrum resource can only serve one user in a certain time, and the spectrum utilization rate of the system is very low. Non-orthogonal multiple access techniques, including power domain non-orthogonal multiple access and sparse code multiple access, are considered to be a viable technique for improving the spectral efficiency and number of links of the system;
through the search of the prior patent and the related technology, the prior technology and scheme related to the non-orthogonal receiving and transmitting design comprise:
(1) Patent document CN201911376448.2 discloses a security coding method for a non-orthogonal multiple access system based on polarization codes, which uses artificial noise to resist eavesdroppers and can maximize the security capacity of the system. In addition, the method utilizes the nesting characteristic of the polarization code of the transmitting end to construct a safety information placement interval and encodes the polarization code. Secure non-orthogonal wireless transmission is achieved.
(2) The patent document with the application number of CN201910017772.9 discloses a non-orthogonal multiple access network safe transmission method based on ARQ protocol, which utilizes the non-orthogonal multiple access technology of automatic retransmission to realize safe transmission.
The solution disclosed in the above document has a problem of giving only an eavesdropper a chance of interference or reducing information leakage. In particular, in non-orthogonal multiple access, users served simultaneously are legal users, their information is public, and privacy protection cannot be performed on the user information.
(3) Patent document with application number of CN202010166288.5 discloses a SCMA multi-user detection method based on sphere decoding optimization. The method provides a low-complexity multi-user detection scheme with faster convergence speed for the superimposed code words of the high-dimensional sparse code division multiple access system with reasonable spherical radius and the distribution rule of observation constellation points. The above scheme can consider the signal detection problem of the non-orthogonal transmission scheme in the multi-carrier system, but needs to analyze the distribution rule of the synthesized constellation points of a plurality of users, and the information of the users is not protected, and has the characteristic that the complexity increases exponentially with the increase of the user codebook.
In the prior art, the inventors have found that no privacy protection is explicitly provided for non-orthogonal transmission systems by the current transmission systems. In a downlink non-orthogonal transmission system, considering the problem of high-dimensional sparse codeword transmission of a plurality of users, a sparse high-dimensional codebook of each user is designed in advance, and in order to use multi-user joint detection, a base station and the users both know the codebook of the used users. At the base station, the information of each user is mapped in high dimension according to the own codebook, and the obtained code word is subjected to superposition coding. At the receiving end, each user uses an information transfer algorithm to carry out multi-user information joint detection, and finally only own information is left, and the information of other users is discarded. In this model, the information between users lacks protection.
In summary, in the existing non-orthogonal multiple access technology, especially downlink transmission, modulation between users is transparent, and each user can obtain information of other users through a multi-user detection algorithm. Therefore, privacy between users cannot be protected, which easily causes information leakage problems. In addition, errors in serial interference cancellation in power domain non-orthogonal multiple access can lead to reduced system performance, with multi-user detection in sparse code multiple access being complex and increasing exponentially with codebook size. In summary, the conventional ofdma and the existing non-ofdma techniques have great challenges in terms of spectrum efficiency, security and reliability, and a safe and reliable non-orthogonal transceiver design method needs to be established.
Disclosure of Invention
In order to overcome the defects and shortcomings of the prior art, a first object of the present invention is to provide a non-orthogonal security coding method based on privacy protection, which encrypts bit information of each user, obtains transmission code words through mapping of high-dimensional sparse code words, and finally performs spread spectrum and superposition according to a factor graph structure, thereby implementing non-orthogonal transmission with high spectrum efficiency and privacy protection, and solving the problem of privacy protection for each user under the condition of non-orthogonal multi-transmission.
A second object of the present invention is to provide a storage medium.
A third object of the present invention is to provide a computer device.
In order to achieve the first object, the present invention adopts the following technical scheme:
the non-orthogonal security coding method based on privacy protection is used for a downlink non-orthogonal transmission system and specifically comprises the following steps:
channel estimation and key distribution steps: embedding a decryption key of a target user to be encrypted into a pilot sequence, and transmitting pilot and key blocks to the target user to be encrypted, wherein the pilot sequence is used for estimating a channel of each user, the pilot sequence is generated in advance for each user through a base station, and the pilot sequence is transmitted to different users through different time slots;
a first modulation step: performing first encryption processing on a plurality of groups of information bits to obtain first encrypted data, wherein the first encryption processing comprises non-redundant bit modulation and redundant bit modulation, and the plurality of groups of information bits are obtained by grouping according to a first information bit stream received by a terminal;
a second modulation step: performing high-dimensional modulation on the first encrypted data to obtain second encrypted data;
demodulation and decryption steps: and processing the second encrypted data according to the multi-user joint detection, judging whether the second encrypted data is the personal information of the current terminal, and if so, performing decryption processing to obtain a second information bit stream, wherein the decryption processing is inverse processing combining the first encryption processing, the high sparse code word mapping and the second encryption processing.
As a preferable technical scheme, the redundancy-free bit modulation is modulation processing for keeping the original bit number unchanged, the redundancy-free bit modulation comprises first redundancy-free bit encryption processing and second redundancy-free bit encryption processing, and the first redundancy-free bit encryption processing and the second redundancy-free bit encryption processing respectively adopt replacement processing and two-dimensional replacement processing;
the first redundancy-free bit encryption processing performs bit information replacement on the original information bits according to a replacement rule table to complete an encryption process;
said firstThe two redundancy-free bit encryption processing divides the original bit data into two parts corresponding to the rows and columns of the two-dimensional table, obtains the encryption number information in a decimal form through searching, converts the encryption number information into binary encryption number data, and then communicates with M 1 Bit information is combined to complete the encryption process;
the redundancy adding bit modulation is modulation processing for adding redundant bit information to protect original information, the redundancy adding bit modulation comprises redundancy adding bit processing, and the redundancy adding bit processing adopts expansion replacement processing;
and the redundancy bit adding process correspondingly searches the original information bits according to the binary expansion substitution table, selects a decimal number which is set randomly in advance, converts the decimal number into binary bit, and further completes the encryption process as bit information of encryption output.
As a preferred technical solution, the first redundancy-free bit encryption processing specifically includes the following steps:
setting the bit number of each group of information bits according to the size of the high-dimensional codebook, and grouping the first information bit stream to obtain a plurality of groups of information bits;
marking each bit in turn according to the number of bits of each group of information bits;
generating a plurality of non-overlapping random integers according to the bit number of each group, wherein the number of the random integers is the bit number of each group, the numerical range of the random integers is 1 to the bit number of each group, and a set formed by the plurality of random integers is set as a replacement rule table according to the generation sequence;
and mapping each group of information bits according to the substitution rule table to obtain first encrypted data.
As a preferable technical solution, the second redundancy-free bit encryption processing specifically includes the following steps:
grouping the first information bit stream to obtain multiple groups of information bits, each group of information bits including header data and tail data, and setting the bit number of each group of information bits as d (M 1 +M 2 ) Wherein d represents the number of groups of packets and is a positive integer, M 1 Representing the number of row bits of a two-dimensional substitution table as the header numberAccording to the number of bits, M 2 A column bit number representing the two-dimensional substitution table as a bit number of the tail data;
Each of the head data may represent a different row of the two-dimensional substitution table, and each of the tail data may represent a different column of the two-dimensional substitution table;
from sequence number 0 to M 2 -1, randomly generating M 2 A positive integer, wherein M is randomly selected from the two-dimensional substitution table at different positions of each row 2 Positive integers, and ensuring that elements of each column are different, thereby forming a two-dimensional substitution table;
finding an encryption number at a corresponding position based on bit information of the head data, bit information of the tail data and the two-dimensional substitution table, and converting the encryption number into a binary number form to obtain binary encryption number data, wherein the encryption number is obtained through random generation;
and replacing the tail data with binary encrypted data, and combining the head data with the binary encrypted data to obtain first encrypted data.
As a preferred technical solution, the redundant bit adding process specifically includes the following steps:
grouping the first information bit stream to obtain a plurality of groups of information bits, wherein the bit number of each group of information bits is set as b, and b is a natural number;
generating log using high-dimensional codebook M 2 M bits of information according to the log 2 All possible representations of M-bit information constitute a first set of information G;
Bringing all possible representations of the bit binary information into a second information set F, wherein the number of elements of the second information set F is smaller than that of elements of the first information set G;
randomly selecting element coordination binary pairs in the first information set G and the second information set F to form a binary expansion substitution table;
and mapping each group of information bits according to the binary expansion substitution table to obtain first encrypted data.
As a preferable technical solution, the demodulating and decrypting step specifically includes:
demodulating information of all terminals, wherein each terminal is matched with different transmission symbols, judging whether the transmission symbol of the current terminal is personal information of the current terminal or not, if so, decrypting, wherein the transmission symbol is a code word obtained by superposition coding of multi-user signals according to a system factor graph, data received by each terminal comprises information of all terminals, each terminal has a high-dimensional sparse codebook and a modulation mode of all users, the high-dimensional sparse codebooks of all users are respectively preset for each terminal through a base station, the high-dimensional sparse codebooks of each terminal are different, and multi-user joint detection is completed by utilizing an information transfer algorithm to obtain demodulated code words and corresponding bit information;
And performing inverse processing according to the first encryption processing adopted by each terminal to finish decryption, thereby obtaining a second information bit stream.
As a preferable technical solution, the decryption is completed by performing inverse processing according to the first encryption processing adopted by each terminal, specifically: for the case of employing the first redundancy-free bit encryption process, the reverse permutation rule table is usedDecryption is completed, wherein the reverse substitution rule table +.>The sequence numbers are replaced according to the sequence numbers from small to large of the integers; for the case of adopting encryption redundant bit processing, decryption is completed according to the binary expansion substitution table; for the case of using the second redundancy-free bit encryption process, the packet is first divided into groups of M 1 +M 2 Bits are converted into decimal, according to M 1 Determining the number of lines from the bit information according to M 2 The bit information determines the number of columns, thereby determining the position of the original bit information in the two-dimensional substitution table and obtaining the original bit information.
As a preferable technical solution, the second modulating step specifically includes: and performing high-sparse codeword mapping on the first encrypted data to obtain a transmission codeword, performing second encryption processing on the transmission codeword according to the system factor graph structure to obtain second encrypted data, and broadcasting the second encrypted data to each terminal, wherein the second encryption processing comprises spread spectrum and superposition.
In order to achieve the second object, the present invention adopts the following technical scheme:
a storage medium storing a program which, when executed by a processor, implements the above-described privacy-preserving non-orthogonal security coding method.
In order to achieve the third object, the present invention adopts the following technical scheme:
a computing device comprising a processor and a memory for storing a program executable by the processor, the processor implementing the above-described privacy-preserving non-orthogonal security encoding method when executing the program stored in the memory.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) In the downlink non-orthogonal transmission process, the invention encrypts the information bits by using the user private key at the transmitting end according to the user service quality requirement under the condition that privacy protection is required for a plurality of user information, and then carries out high-dimensional modulation and superposition coding, thereby having the technical effect of preventing interception of others, improving the efficiency and the safety of multi-user information transmission, reducing the interference influence of multiple users and the complexity of multi-user detection, and having the advantages of easy operation, strong real-time performance and strong flexibility.
(2) The invention adopts a high-dimensional sparse encryption scheme, namely, encryption coding is carried out according to a user encryption algorithm and a factor graph structure, multi-user information is overlapped and broadcast, so that higher spectrum resource utilization rate is achieved, and the transmission rate is improved to the greatest extent by fully utilizing limited spectrum resources; taking multi-user non-orthogonal transmission and user privacy protection into consideration, carrying out special encryption coding on user information at a transmitting end, namely encrypting original information bits according to a bit encryption algorithm before modulation and superposition coding, thereby improving the reliability and safety of the non-orthogonal transmission; the invention carries out high-dimensional modulation according to the encrypted information bits and obtains the overlapped code words of a plurality of users according to the system factor graph, thereby achieving the safe and reliable transmission of the downlink multi-user information and having the advantages of high spectrum utilization efficiency and strong practicability.
(3) The key is distributed in a pilot sequence embedding mode, namely, before the superimposed code words of all users are broadcast, the base station independently transmits the pilot sequence embedded with the key to each user, wherein a pilot sequence part is used for estimating channel state information, a key part is used for decrypting bit information, the effect of key safe transmission is achieved, and the method has the advantages of low cost and simplicity in coding in the downlink non-orthogonal transmission process.
(4) The invention adopts the first encryption processing comprising the modulation without redundant bits and the modulation with redundant bits to adjust the service quality requirement of the actual user, and the modulation with redundant bits not only reduces the error rate of the user information transmission and the detection complexity, but also increases the resolution of the information, thereby realizing reliable transmission and privacy protection and further improving the safety of the system.
Drawings
Fig. 1 is a transmission schematic diagram of a non-orthogonal security coding method based on privacy protection in embodiment 1 of the present invention;
FIG. 2 is a flow chart showing the steps of a non-orthogonal security coding method based on privacy protection in embodiment 1 of the present invention;
FIG. 3 is a schematic diagram illustrating the substitution of the first redundancy-free bit encryption process in embodiment 1 of the present invention;
fig. 4 is a schematic diagram of simulation versus privacy protection result of the non-orthogonal security coding method based on privacy protection in embodiment 1 of the present invention.
Detailed Description
In the description of the present disclosure, it should be noted that the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Likewise, the terms "a," "an," or "the" and similar terms do not denote a limitation of quantity, but rather denote the presence of at least one. The word "comprising" or "comprises", and the like, means that elements or items appearing before the word are encompassed by the element or item recited after the word and equivalents thereof, and that other elements or items are not excluded. The terms "connected" or "connected," and the like, are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect.
In the description of the present disclosure, it should be noted that the terms "mounted," "connected," and "connected" are to be construed broadly, unless otherwise specifically defined and limited. For example, the connection can be fixed connection, detachable connection or integrated connection; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the terms in this disclosure will be understood by those of ordinary skill in the art in the specific context. In addition, technical features related to different embodiments of the present disclosure described below may be combined with each other as long as they do not make a conflict with each other.
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Examples
Example 1
As shown in fig. 1 and fig. 2, the present embodiment provides a non-orthogonal security coding method based on privacy protection, which is used for a downlink non-orthogonal transmission system, and specifically includes the following steps:
channel estimation and key distribution steps: the base station pre-generates a gaussian pilot sequence for each user and transmits to different users through different time slots. The pilot sequence is used to estimate the channel for each user. And setting a user encryption option according to the service quality requirement of the user when the information of the individual user needs to be encrypted, embedding a decryption key of the user into a pilot sequence after encryption, transmitting the pilot and the key to the user together, and simultaneously completing channel estimation and key distribution, thereby improving the utilization rate of the channel.
A first modulation step: and carrying out first encryption processing on the plurality of groups of information bits to obtain first encrypted data. In practical application, the first encryption process includes redundancy-free bit modulation and redundancy-added bit modulation, and multiple groups of information bits are obtained by grouping according to a first information bit stream received by a terminal.
A second modulation step: and carrying out high-dimensional modulation on the first encrypted data to obtain second encrypted data. In practical application, the first encrypted data is subjected to high sparse codeword mapping to obtain a transmission codeword, the transmission codeword is subjected to second encryption processing according to a system factor graph structure to obtain second encrypted data, the second encrypted data is broadcasted to each terminal, wherein the second encryption processing comprises spread spectrum and superposition, namely spread spectrum and superposition coding is performed on the transmission codeword according to the system factor graph structure;
demodulation and decryption steps: and processing the second encrypted data according to the multi-user joint detection, judging whether the second encrypted data is the personal information of the current terminal, and if so, performing decryption processing to obtain a second information bit stream, wherein the decryption processing is inverse processing combining the first encryption processing, the high sparse codeword mapping and the second encryption processing.
In this embodiment, each terminal is regarded as a user, and the modulation and demodulation processes in the non-orthogonal multiple access system are transparent for each user, and the privacy protection of each user is implemented by performing the first encryption process, that is, performing the bit encryption before the second modulation step.
In the present embodiment, the redundancy-free bit modulation is a modulation process that keeps the original bit number unchanged. The modulation process of adding redundancy bits to add redundancy bit information to protect the original information. The redundancy-free bit modulation comprises a first redundancy-free bit encryption process and a second redundancy-free bit encryption process, wherein the first redundancy-free bit encryption process and the second redundancy-free bit encryption process respectively adopt a replacement process and a two-dimensional replacement process. The redundancy bit adding modulation comprises redundancy bit adding processing, and the redundancy bit adding processing adopts expansion replacement processing.
In practical application, the redundancy-free bit modulation does not change the original information bit number, and the redundancy-added bit modulation adds redundancy information bits. For the first redundancy-free bit additionPerforming encryption processing, namely performing bit information replacement on original information bits according to a replacement rule table to complete an encryption process; for the second redundancy-free bit encryption processing, the original bit data is divided into two parts corresponding to the rows and columns of the two-dimensional table, the decimal form encryption number information is obtained through searching, and then the binary encryption number information is converted into binary encryption number data which is then matched with M 1 Bit information is combined to complete the encryption process; for the processing of adding redundant bits, corresponding searching is carried out on the original information bits according to the binary expansion substitution table, a decimal number which is set randomly in advance is selected, and then the decimal number is converted into binary bits to be used as bit information of encryption output, so that the encryption process is completed.
In the present embodiment, the first encryption process is expressed as:
in the middle ofRespectively denoted as a first redundancy-free bit encryption process, a redundancy-bit addition process, and a second redundancy-free bit encryption process.
As shown in fig. 3, the first redundancy-free bit encryption process specifically includes the following steps:
and setting the bit number of each group of information bits according to the size of the high-dimensional codebook, and grouping the first information bit stream to obtain a plurality of groups of information bits. In practical application, the bit number of each group of information bits is set to be Llog 2 M, wherein M is the size of a high-dimensional codebook, and L is a positive integer;
marking each bit in turn according to the number of bits of each group of information bits; in practical application, the materials are sequentially counted as 1,2,3, … and L log from left to right 2 The order of M marks each bit of information.
Generating a plurality of non-overlapping random integers according to the bit number of each group, wherein the number of the random integers is the bit number of each group, the numerical range of the random integers is 1 to the bit number of each group, and the set formed by the plurality of random integers is arranged according to the generation sequencePut into a substitution rule table. In practical use, L log is randomly generated 2 M1, 2,3, …, L log 2 M random integers, thereby obtaining a substitution rule table from a set of a plurality of random integers.
And mapping each group of information bits according to the substitution rule table to obtain first encrypted data.
In this embodiment, the redundancy bit adding process specifically includes the following steps:
and grouping the first information bit stream to obtain a plurality of groups of information bits. In practical application, the bit number of each group of information bits is set as b, wherein b is a natural number;
generating log using high-dimensional codebook M 2 M bits of information according to the log 2 All possible representations of M-bit information constitute a first set of information G;
Let all possible representations of the bit binary information be grouped into a second information group F, and the number of elements of the second information group F is smaller than the number of elements of the first information group G.
Randomly selecting element coordination binary pairs in the first information set G and the second information set F to form a binary expansion substitution table, namely GC = { (F, G) |f epsilon F, G epsilon G;
and mapping each group of information bits according to the binary expansion substitution table to obtain first encrypted data.
In this embodiment, the second redundancy-free bit encryption process specifically includes the following steps:
and grouping the first information bit stream to obtain a plurality of groups of information bits, wherein each group of information bits comprises head data and tail data. In practical use, the bit number of each group of information bits is set to d (M 1 +M 2 ) Wherein d represents the number of groups of packets and is a positive integer, M 1 Representing the number of row bits of a two-dimensional substitution table, M being the number of bits of header data 2 A column bit number representing the two-dimensional substitution table as a bit number of the tail data;
each of the head data may represent a different row of the two-dimensional substitution table, and each of the tail data may represent a different column of the two-dimensional substitution table;
from sequence number 0 to M 2 -1, randomly generating M 2 A positive integer, wherein M is randomly selected from the two-dimensional substitution table at different positions of each row 2 Positive integers, and ensuring that elements of each column are different, thereby forming a two-dimensional substitution table;
finding the encryption number at the corresponding position based on the bit information of the head data, the bit information of the tail data and the two-dimensional substitution table, and converting the encryption number into a binary number form to obtain binary encryption number data e b ;
Replacing the mantissa data with binary encrypted data, and combining the header data with the binary encrypted data to obtain first encrypted data;
in this embodiment, the demodulation and decryption step includes the specific steps of:
and demodulating information of all terminals, wherein each terminal is matched with different transmission symbols, judging whether the information is personal information of the current terminal according to the transmission symbol of the current terminal, and if so, decrypting. In practical application, the data received by each terminal comprises information of all terminals, each terminal has a high-dimensional sparse codebook and a modulation mode of all users, the high-dimensional sparse codebooks of all users are respectively preset for each terminal through a base station, the high-dimensional sparse codebooks of all terminals are different, and multi-user joint detection is completed by using an information transfer algorithm to obtain demodulation code words and corresponding bit information.
And performing inverse processing according to the first encryption processing adopted by each terminal to finish decryption, thereby obtaining a second information bit stream.
In this embodiment, the transmission symbol is a codeword obtained by superposition coding of multi-user signals according to a system factor graph.
In this embodiment, decryption is completed by performing inverse processing according to the first encryption processing adopted by each terminal, specifically: for the case of employing the first redundancy-free bit encryption process, the reverse permutation rule table is usedDecryption is completed, wherein the reverse substitution rule table +.>The sequence numbers are replaced according to the sequence numbers from small to large of the integers; for the case of adopting encryption redundant bit processing, decryption is completed according to the binary expansion substitution table; for the case of using the second redundancy-free bit encryption process, the packet is first divided into groups of M 1 +M 2 Bits are converted into decimal, according to M 1 Determining the number of lines from the bit information according to M 2 The bit information determines the number of columns, thereby determining the position of the original bit information in the two-dimensional substitution table and obtaining the original bit information.
In this embodiment, each terminal only has its own encryption and decryption modes, and cannot obtain the encryption and decryption modes of other terminals, so as to achieve the effect of protecting the privacy of the user. Further, according to the requirements of the user on the service quality, a proper bit encryption scheme is selected, and the high-dimensional sparse codebook is utilized for modulation, so that the reliability of system transmission is improved.
The non-orthogonal security coding method based on privacy protection provided by the embodiment fully utilizes limited spectrum resources through high-dimensional sparse code superposition coding, realizes the privacy protection of user information while sharing the spectrum resources by multiple users, namely realizes the privacy protection of non-orthogonal transmission with high spectrum efficiency; according to the embodiment, the first encryption processing is selected for different terminals according to the actual needs of the system, the original information bits are encrypted, high-dimensional codeword mapping is performed according to the multi-user factor graph, and finally the multi-user detection and the personal decryption algorithm are utilized for decryption, so that safe and reliable non-orthogonal transmission is realized, and the safety of user information and the reliability of detection are enhanced.
As shown in fig. 4, in this embodiment, simulation comparison is performed under the gaussian white noise channel, and the setting condition is that the information of the user1 is relatively sensitive and needs protection. After bit encryption, the information of User1 is secret at the rest 8 users through remodulation and superposition coding. Selecting simulation results of 4 users as an example to illustrate, wherein User1 is a non-orthogonal security coding method based on privacy protection of the embodiment, and User2-4 does not adopt the coding method of the embodiment, selecting any User except User1 to decode, and obtaining according to the simulation results: other users can not successfully decode the User1 information, the error rate is always 0.5, and the fact that other users can not acquire the plaintext information of the User1 is indicated, so that the privacy protection effect is achieved.
Example 2
This embodiment 2 further describes, based on embodiment 1, a downlink non-orthogonal security transmission system as an example:
as shown in fig. 1, the downlink non-orthogonal security transmission system in this embodiment adopts the non-orthogonal security coding method based on privacy protection in embodiment 1.
In this embodiment, the transmission system is provided with 9 terminals and 1 central base station, that is, the central base station provides transmission services for 9 users at the same time, where the central base station is provided with a transmission processor, a transmitting end and a receiving end, and the central base station configures 6 subcarriers for communication transmission. When the receiving end receives the information bit streams of all users, the transmission processor respectively encrypts the information bit streams of each terminal by utilizing first encryption processing to obtain first encrypted data, then carries out high-dimensional modulation to obtain high-dimensional transmission code words, carries out superposition coding on the transmission code words to obtain second encrypted data, and finally broadcasts the second encrypted data to 9 terminals by utilizing 6 subcarriers.
At the terminal, the transmission code words of 9 users are estimated simultaneously by utilizing multi-user joint detection, and the corresponding bit information is obtained through demodulation. In practical application, each terminal only has a decryption processing mode of acquiring itself, and finally only each terminal can acquire information bits of itself, so that information of other terminals is protected.
As shown in connection with fig. 2, the entire codec process includes 4 stages, namely a channel estimation and key distribution stage, a first modulation stage, a second modulation stage, and a demodulation decryption stage. In the first modulation stage, a private key is preset for each terminal according to the characteristics of non-orthogonal wireless communication and the service quality requirement of a user, wherein the private key is obtained by adopting replacement processing, expansion replacement processing and two-dimensional replacement processing, the replacement processing and the two-dimensional replacement processing are respectively corresponding to the encryption modes of the first encryption processing without redundant bits and the second encryption processing without redundant bits, and the expansion replacement processing is corresponding to the encryption mode of the processing with redundant bits. Before user data transmission, the base station needs to transmit a pilot sequence to measure channel information of each user. Thus, the base station may distribute the private key by embedding the private key within the pilot sequence. In the second modulation stage, high-dimensional symbol mapping is performed, and multi-user information superposition coding is performed according to a system factor graph. In practical application, the private key can be preset only for the terminal with data sensitivity, so that the encryption processing has flexibility, and the waste of system computing resources is avoided.
In this embodiment, in the channel estimation and key distribution phase, the base station generates a gaussian pilot sequence for each user in advance and transmits it to different users through different time slots. The pilot sequence is used to estimate the channel for each user. And setting a user encryption option according to the service quality requirement of the user when the information of the individual user needs to be encrypted, embedding a decryption key of the user into a pilot sequence after encryption, transmitting the pilot and the key to the user together, and simultaneously completing channel estimation and key distribution.
Referring to FIG. 3, the function of the substitution rule table mapping each group of information bits is made an encryption algorithmIn this embodiment, the first redundancy-free bit encryption process specifically includes the following steps:
grouping the first information bit stream to make the information bit stream transmitted by each terminal expressed as b j Where j=1, 2,3,4,5,6,7,8,9, after grouping, each group has 10 bits, e.g. denoted as {0110001011};
marking each bit of information in the order 1,2,3,4,5,6,7,8,9,10 from left to right;
randomly generating 10 integers of 1-10, wherein a set of 10 generated random integers is used as a substitution rule table, namely {8,3,9,7,4,10,1,6,2,5};
each set of information bits is mapped according to a permutation rule table.
In practical application, when decrypting based on the encryption algorithm, the integers in the substitution rule table are arranged in order from small to large to form an inverse substitution rule tableI.e., {7,9,2,5,10,8,4,1,3,6};
in this embodiment, the function of mapping each group of information bits by the binary expansion substitution table is made to be an encryption algorithmIn practical application, the redundancy bit adding process specifically comprises the following steps:
grouping the first information bit streams, each group having 10 bits {0110001011};
Modulating with a high-dimensional codebook, setting the size of the high-dimensional codebook to 8, namely M=8, and generating a first information set G= {000,001,010,100,011,110,101,111} of 3-bit information, wherein the first information set G is provided with 8 elements;
the number of bits b=2, all representative sets of 2 bits of information are set to f= {00,01,11,10}, where the elements of the second set of information F are only 4 and the elements of the first set of information G are 8.
Randomly selecting 4 elements in the first information set G as binary pair sheet pairing tables, for example {000,011,101,111}, and coordinating binary pairs with elements in the second information set F to form a binary expansion substitution table, wherein the binary expansion substitution table is specifically expressed as:
C={(00,000),(01,011),(11,101),(10,111)};
and mapping each group of information bits according to the binary expansion substitution table.
In the present embodiment, the two-dimensional substitution table is processed as an encryption algorithmIn practical application, the second redundancy-free bit encryption process specifically includes the following steps:
grouping the first information bit stream, each group having 5 bits, each group having header data and tail data, the header data and tail data being consecutive in bits, and setting M 1 =2,M 2 =3, i.e. M 1 As the bit number of header data, M 2 As the number of bits of the tail data, the tail data is used to replace the encrypted data.
Setting different rows of the two-dimensional substitution table, sequentially representing the different rows of the two-dimensional substitution table by using 2-bit information, setting different columns of the two-dimensional substitution table, sequentially representing the different columns of the two-dimensional substitution table by using 3-bit information, and ensuring that the elements of each column are different, thereby forming the two-dimensional substitution table;
obtaining the number of rows and the number of columns of the corresponding two-dimensional substitution table according to the head data and the tail data respectively, so as to find the encryption number of the corresponding position of the two-dimensional substitution table, and converting the encryption number into a binary form to obtain binary encryption number data;
and replacing the tail data with binary encrypted data, and combining the head data with the binary encrypted data to obtain first encrypted data.
In practical application, combine M 1 And M is as follows 2 Is shown in table 1 below:
table 1 two-dimensional substitution table
00 | 6 | 2 | 1 | 5 | 0 | 3 | 7 | 4 |
01 | 2 | 4 | 5 | 0 | 1 | 6 | 3 | 7 |
11 | 5 | 1 | 3 | 2 | 7 | 4 | 0 | 6 |
10 | 0 | 7 | 6 | 1 | 2 | 5 | 4 | 3 |
000 | 001 | 010 | 100 | 011 | 101 | 110 | 111 |
As can be seen from Table 1, the original bit information can be represented as {11,100}, all possible representations of 2-bit information for header data as {00,01,11,10}, and all possible representations of 3-bit information for trailer data as {000,001,010,100,011,101,110,111}. The first 2 bits 11 of the original bit information are determined as the 3 rd row of the table, and the last 3 bits 100 of the original bit information are determined as the 4 th column outside the header, so that the encryption number 2 is obtained. And converting the encrypted number into binary number 010 to obtain binary encrypted number data, wherein the bit number of the binary encrypted number data is consistent with the bit number of the tail data. The 11 of the header data is combined with the binary encrypted data to obtain first encrypted data, i.e., {11,010}.
The encryption numbers in the two-dimensional substitution table are randomly generated, and the present embodiment is not limited thereto.
In this embodiment, after the first modulation stage, that is, after the multi-user information security encoding stage, each terminal has selected a specific encryption algorithm, and has performed bit encryption according to the encryption algorithm; the encoding step in the second modulation stage specifically includes:
setting a two-dimensional codebook according to a system factor graph structure; in practical application, the two-dimensional codebook specifically comprises the following steps:
and setting Cartesian product codes, namely selecting QPSK constellation points for elements in each dimension to obtain a high-dimensional codebook.
Obtaining a plurality of code words according to Gray mapping, wherein each code word is formed by two-bit Gray mapping of every two bits;
and carrying out spread spectrum superposition on the code words of each terminal according to the system factor graph structure to obtain second encrypted data, and broadcasting the second encrypted data to each terminal.
In this embodiment, in the demodulation and decryption stage, each terminal receives the second encrypted data broadcast by the base station, and taking one of the terminals as an example, the terminal first uses a multi-user detection algorithm to demodulate, and then uses a private key to decrypt, and the specific steps in the demodulation and decryption stage include:
Carrying out joint detection according to the factor graph by utilizing an information transfer algorithm, and estimating transmission code words of 9 terminals;
selecting a transmission codeword matched by a terminal, and performing bit mapping according to two-bit Gray mapping designed by a codebook to obtain the demodulated bit number; in addition, those skilled in the art may also use other coding mapping modes such as multi-bit gray mapping according to practical situations, and the embodiment is not limited herein.
Each set of demodulated bits is decrypted using a private key. In practical application, for encryption algorithmThe decryption algorithm is to complete decryption according to the inverse substitution rule table {7,9,2,5,10,8,4,1,3,6}, i.e. the bit information after demodulation is substituted according to the position relationship to obtain the original bit information; encryption algorithm->Decryption is achieved according to binary expansion substitution table c= { (00,000), (01,011), (11, 101), (10, 111) }; encryption algorithm->Every 5 bits of demodulated bit information are taken as a group, the next 3 bits are converted into decimal numbers, the previous 2 bits of bit information determine the number of lines, if the encrypted bit information is correctly borrowed to obtain binary information 11010, the nextThe 3 bits 010 of (2) are converted into decimal 2, the first 2 bits represent the third row, i.e. the third row in table 1 finds the encrypted number 2, the column where the encrypted number 2 is located is the 4 th column, and the corresponding 100 is 100, i.e. the decrypted bit information is 11100;
Each terminal only knows the encryption processing mode adopted by the terminal, only can decrypt the information bit stream of the terminal, and can not decrypt the information bit streams of other terminals.
In this embodiment, the 4 stages of the present embodiment are systems for constructing downlink non-orthogonal secure and reliable transmission, and those skilled in the art can apply the system to develop a sixth generation (6G) wireless secure communication multiple access transmission system or an internet of things signal secure transmission system, so as to achieve secure and reliable system performance while achieving high spectrum efficiency.
Example 3
Those skilled in the art will appreciate that implementing all or part of the steps of the above implementation, the privacy-preserving-based non-orthogonal security coding methods mentioned in the foregoing embodiments 1 and 2 may be independently developed on multiple software platforms, and have the advantages of being robust and portable.
Example 4
The present embodiment provides a computing device, which may be a desktop computer, a notebook computer, a smart phone, a PDA handheld terminal, a tablet computer, or other terminal devices with display functions, where the computing device includes a processor and a memory, where the memory stores one or more programs, and when the processor executes the programs stored in the memory, the privacy protection-based non-orthogonal security coding method of embodiment 1 and embodiment 2 is implemented.
The above examples are preferred embodiments of the present invention, but the embodiments of the present invention are not limited to the above examples, and any other changes, modifications, substitutions, combinations, and simplifications that do not depart from the spirit and principle of the present invention should be made in the equivalent manner, and the embodiments are included in the protection scope of the present invention.
Claims (9)
1. The non-orthogonal security coding method based on privacy protection is used for a downlink non-orthogonal transmission system and is characterized by comprising the following steps:
channel estimation and key distribution steps: embedding a decryption key of a target user to be encrypted into a pilot sequence, and transmitting pilot and key blocks to the target user to be encrypted, wherein the pilot sequence is used for estimating a channel of each user, the pilot sequence is generated in advance for each user through a base station, and the pilot sequence is transmitted to different users through different time slots;
A first modulation step: performing first encryption processing on a plurality of groups of information bits to obtain first encrypted data, wherein the first encryption processing comprises non-redundant bit modulation and redundant bit modulation, and the plurality of groups of information bits are obtained by grouping according to a first information bit stream received by a terminal;
a second modulation step: performing high-dimensional modulation on the first encrypted data to obtain second encrypted data;
demodulation and decryption steps: processing the second encrypted data according to the multi-user joint detection, judging whether the second encrypted data is the personal information of the current terminal, if so, performing decryption processing to obtain a second information bit stream, wherein the decryption processing is inverse processing combining the first encryption processing, the high sparse code word mapping and the second encryption processing;
the redundancy-free bit modulation is modulation processing for keeping the original bit number unchanged, the redundancy-free bit modulation comprises first redundancy-free bit encryption processing and second redundancy-free bit encryption processing, and the first redundancy-free bit encryption processing and the second redundancy-free bit encryption processing respectively adopt replacement processing and two-dimensional replacement processing;
the first redundancy-free bit encryption processing performs bit information replacement on the original information bits according to a replacement rule table to complete an encryption process;
The second redundancy-free bit encryption processing divides the original bit data into two parts corresponding to the rows and columns of the two-dimensional table, obtains the encryption number information in a decimal form through searching, converts the encryption number information into binary encryption number data, and then communicates with M 1 Bit information is combined to complete the encryption process;
the redundancy adding bit modulation is modulation processing for adding redundant bit information to protect original information, the redundancy adding bit modulation comprises redundancy adding bit processing, and the redundancy adding bit processing adopts expansion replacement processing;
and the redundancy bit adding process correspondingly searches the original information bits according to the binary expansion substitution table, selects a decimal number which is set randomly in advance, converts the decimal number into binary bit, and further completes the encryption process as bit information of encryption output.
2. The privacy-preserving-based non-orthogonal security coding method of claim 1, wherein the first redundancy-free bit encryption process specifically comprises the steps of:
setting the bit number of each group of information bits according to the size of the high-dimensional codebook, and grouping the first information bit stream to obtain a plurality of groups of information bits;
marking each bit in turn according to the number of bits of each group of information bits;
Generating a plurality of non-overlapping random integers according to the bit number of each group, wherein the number of the random integers is the bit number of each group, the numerical range of the random integers is 1 to the bit number of each group, and a set formed by the plurality of random integers is set as a replacement rule table according to the generation sequence;
and mapping each group of information bits according to the substitution rule table to obtain first encrypted data.
3. The privacy-based non-orthogonal security coding method according to claim 1, wherein the second redundancy-free bit encryption process specifically comprises the steps of:
for the first information bitThe stream is grouped to obtain a plurality of groups of information bits, each group of information bits comprises header data and tail data, and the bit number of each group of information bits is set to d (M 1 +M 2 ) Wherein d represents the number of groups of packets and is a positive integer, M 1 Representing the number of row bits of a two-dimensional substitution table, M being the number of bits of header data 2 A column bit number representing the two-dimensional substitution table as a bit number of the tail data;
each of the head data may represent a different row of the two-dimensional substitution table, and each of the tail data may represent a different column of the two-dimensional substitution table;
from sequence number 0 to M 2 -1, randomly generating M 2 A positive integer, wherein M is randomly selected from the two-dimensional substitution table at different positions of each row 2 Positive integers, and ensuring that elements of each column are different, thereby forming a two-dimensional substitution table;
finding an encryption number at a corresponding position based on bit information of the head data, bit information of the tail data and the two-dimensional substitution table, and converting the encryption number into a binary number form to obtain binary encryption number data, wherein the encryption number is obtained through random generation;
and replacing the tail data with binary encrypted data, and combining the head data with the binary encrypted data to obtain first encrypted data.
4. The non-orthogonal security coding method based on privacy protection according to claim 1, wherein the redundancy bit adding process specifically comprises the following steps:
grouping the first information bit stream to obtain a plurality of groups of information bits, wherein the bit number of each group of information bits is set as b, and b is a natural number;
generating log using high-dimensional codebook M 2 M bits of information according to the log 2 All possible representations of M-bit information constitute a first set of information G;
bringing all possible representations of the bit binary information into a second information set F, wherein the number of elements of the second information set F is smaller than that of elements of the first information set G;
randomly selecting element coordination binary pairs in the first information set G and the second information set F to form a binary expansion substitution table;
And mapping each group of information bits according to the binary expansion substitution table to obtain first encrypted data.
5. The method for non-orthogonal security coding based on privacy protection according to claim 1, wherein the demodulating and decrypting step comprises the following specific steps:
demodulating information of all terminals, wherein each terminal is matched with different transmission symbols, judging whether the transmission symbol of the current terminal is personal information of the current terminal or not, if so, decrypting, wherein the transmission symbol is a code word obtained by superposition coding of multi-user signals according to a system factor graph, data received by each terminal comprises information of all terminals, each terminal has a high-dimensional sparse codebook and a modulation mode of all users, the high-dimensional sparse codebooks of all users are respectively preset for each terminal through a base station, the high-dimensional sparse codebooks of each terminal are different, and multi-user joint detection is completed by utilizing an information transfer algorithm to obtain demodulated code words and corresponding bit information;
and performing inverse processing according to the first encryption processing adopted by each terminal to finish decryption, thereby obtaining a second information bit stream.
6. The privacy protection-based non-orthogonal security coding method according to claim 5, wherein the decryption is completed by performing inverse processing according to the first encryption processing adopted by each terminal, specifically: for the case of employing the first redundancy-free bit encryption process, the reverse permutation rule table is used Decryption is completed, wherein the reverse substitution rule table +.>The sequence numbers are replaced according to the sequence numbers from small to large of the integers; for using adding redundancyUnder the condition of bit processing, decryption is completed according to the binary expansion substitution table; for the case of using the second redundancy-free bit encryption process, the packet is first divided into groups of M 1 +M 2 Bits are converted into decimal, according to M 1 Determining the number of lines from the bit information according to M 2 The bit information determines the number of columns, thereby determining the position of the original bit information in the two-dimensional substitution table and obtaining the original bit information.
7. The privacy-based non-orthogonal security coding method according to claim 1, wherein the second modulation step is specifically: and performing high-sparse codeword mapping on the first encrypted data to obtain a transmission codeword, performing second encryption processing on the transmission codeword according to the system factor graph structure to obtain second encrypted data, and broadcasting the second encrypted data to each terminal, wherein the second encryption processing comprises spread spectrum and superposition.
8. A storage medium storing a program which when executed by a processor implements a privacy protection based non-orthogonal security coding method as claimed in any one of claims 1 to 7.
9. A computing device comprising a processor and a memory for storing a processor executable program, wherein the processor implements the privacy-preserving non-orthogonal security coding method of any of claims 1-7 when executing the program stored in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110711353.2A CN113473457B (en) | 2021-06-25 | 2021-06-25 | Non-orthogonal security coding method based on privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110711353.2A CN113473457B (en) | 2021-06-25 | 2021-06-25 | Non-orthogonal security coding method based on privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113473457A CN113473457A (en) | 2021-10-01 |
CN113473457B true CN113473457B (en) | 2023-06-27 |
Family
ID=77873024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110711353.2A Active CN113473457B (en) | 2021-06-25 | 2021-06-25 | Non-orthogonal security coding method based on privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113473457B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760002A (en) * | 2022-04-13 | 2022-07-15 | 东南大学 | Two-out-of-one careless transmission scheme under single-privacy eavesdropping channel model |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
RU2647631C1 (en) * | 2017-05-30 | 2018-03-16 | Акционерное общество "Российская корпорация ракетно-космического приборостроения и информационных систем" (АО "Российские космические системы") | Satellite communication system with protection of the remote operation management channel |
DE102020122330A1 (en) * | 2019-08-27 | 2021-03-04 | Intel Corporation | Methods, computer programs and devices for configuring a radio carrier of a vehicle to enable Car2x communication |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11025456B2 (en) * | 2018-01-12 | 2021-06-01 | Apple Inc. | Time domain resource allocation for mobile communication |
-
2021
- 2021-06-25 CN CN202110711353.2A patent/CN113473457B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
RU2647631C1 (en) * | 2017-05-30 | 2018-03-16 | Акционерное общество "Российская корпорация ракетно-космического приборостроения и информационных систем" (АО "Российские космические системы") | Satellite communication system with protection of the remote operation management channel |
DE102020122330A1 (en) * | 2019-08-27 | 2021-03-04 | Intel Corporation | Methods, computer programs and devices for configuring a radio carrier of a vehicle to enable Car2x communication |
Also Published As
Publication number | Publication date |
---|---|
CN113473457A (en) | 2021-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10700803B2 (en) | System and method for generating codebooks with small projections per complex dimension and utilization thereof | |
Oggier et al. | Lattice codes for the wiretap Gaussian channel: Construction and analysis | |
CN109644176B (en) | Non-orthogonal multiple access transmission | |
CN107846377B (en) | Method and device for transmitting data | |
US20140369434A1 (en) | System and Method for Designing and Using Multidimensional Constellations | |
CN109155791B (en) | Method for flexible sparse code multiple access codebook design, transmission and detection | |
JP2015159544A (en) | Transmitter, receiver, transmission method, reception method, and method of generating multi-dimensional constellation | |
Lu et al. | A joint physical layer encryption and PAPR reduction scheme based on polar codes and chaotic sequences in OFDM system | |
US7421075B2 (en) | Wireless online cryptographic key generation method | |
Mazin et al. | Secure key management for 5G physical layer security | |
Harshan et al. | A novel power allocation scheme for two-user GMAC with finite input constellations | |
CN113473457B (en) | Non-orthogonal security coding method based on privacy protection | |
CN108574574A (en) | Physical layer encryption method based on multi-dimensional constellation rotation | |
Lai et al. | Secure transmission with interleaver for uplink sparse code multiple access system | |
Alencar | Information theory | |
Ni et al. | PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform | |
CN113922852B (en) | Codebook determination method and device, electronic equipment and computer readable storage medium | |
Li et al. | Design of an energy-efficient multidimensional secure constellation for 5g communications | |
US7680278B2 (en) | Domino scheme for wireless cryptographic communication and communication method incorporating same | |
WO2022218522A1 (en) | Device and method for massive random access | |
Wu et al. | A novel NOMA design based on steiner system | |
KR20200031547A (en) | Method and apparatus for physical layer ciphering based on radio channel status information | |
Ghasemi-Goojani et al. | On the capacity region of asymmetric gaussian two-way line channel | |
CN113726481B (en) | Secure communication method, device and system for wireless communication | |
Ahmed et al. | Stream Cipher with Space-Time Block Code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |